LEADER 02855nam 2200673 a 450 001 9910786096803321 005 20230721044658.0 010 $a1-118-38153-X 010 $a1-299-46486-6 010 $a1-118-59960-8 010 $a1-118-38154-8 035 $a(CKB)2670000000316632 035 $a(EBL)1106528 035 $a(OCoLC)823722243 035 $a(SSID)ssj0000804024 035 $a(PQKBManifestationID)11422604 035 $a(PQKBTitleCode)TC0000804024 035 $a(PQKBWorkID)10814310 035 $a(PQKB)10100301 035 $a(MiAaPQ)EBC1106528 035 $a(Au-PeEL)EBL1106528 035 $a(CaPaEBR)ebr10684947 035 $a(CaONFJC)MIL477736 035 $a(EXLCZ)992670000000316632 100 $a20090708d2009 uy 0 101 0 $aeng 135 $aurcn||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aInformation warfare$b[electronic resource] /$fDaniel Ventre 210 $aLondon $cISTE Ltd. ;$aHoboken, N.J. $cJohn Wiley & Sons$dc2009 215 $a1 online resource (325 p.) 225 1 $aISTE 300 $aDescription based upon print version of record. 311 $a1-84821-094-9 320 $aIncludes bibliographical references and index. 327 $aThe United States and information warfare -- China and information warfare -- India and information warfare -- Japan and information warfare -- Russia and information warfare -- Singapore and information warfare -- How to identify aggressors and acts of aggression -- Which law should be used for information warfare?. 330 $aThis book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed, the challenges faced by countries who fail to secure their cyberspace (Japan, the US, etc.) are enumerated, and ways to distinguish between 410 0$aISTE 606 $aBusiness intelligence 606 $aTrade secrets 606 $aInformation technology$xSecurity measures 606 $aComputer security$xManagement 606 $aData protection 615 0$aBusiness intelligence. 615 0$aTrade secrets. 615 0$aInformation technology$xSecurity measures. 615 0$aComputer security$xManagement. 615 0$aData protection. 676 $a355.3/43 700 $aVentre$b Daniel$0847420 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910786096803321 996 $aInformation warfare$92013678 997 $aUNINA